Sciweavers

13383 search results - page 2403 / 2677
» Abstractions from proofs
Sort
View
138
Voted
EUROPAR
2009
Springer
15 years 8 months ago
SSD-HDD-Hybrid Virtual Disk in Consolidated Environments
Abstract. With the prevalence of multi-core processors and cloud computing, the server consolidation using virtualization has increasingly expanded its territory, and the degree of...
Heeseung Jo, Youngjin Kwon, Hwanju Kim, Euiseong S...
KESAMSTA
2009
Springer
15 years 8 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
133
Voted
PROVSEC
2009
Springer
15 years 8 months ago
Oracle Separation in the Non-uniform Model
Abstract. Oracle separation methods are used in cryptography to rule out blackbox reductions between cryptographic primitives. It is sufficient to find an oracle relative to whic...
Ahto Buldas, Sven Laur, Margus Niitsoo
132
Voted
WDAG
2009
Springer
160views Algorithms» more  WDAG 2009»
15 years 8 months ago
Brief Announcement: The Minimum Failure Detector for Non-Local Tasks in Message-Passing Systems
This paper defines the basic notions of local and non-local tasks, and determines the minimum information about failures that is necessary to solve any non-local task in message-p...
Carole Delporte-Gallet, Hugues Fauconnier, Sam Tou...
134
Voted
COSIT
2001
Springer
139views GIS» more  COSIT 2001»
15 years 8 months ago
Two Path Prepositions: Along and Past
Abstract. We present results from a series of experiments, where relevant factors for the use of path prepositions were examined. We were especially interested in the concepts behi...
Christian Kray, Jörg Baus, Hubert D. Zimmer, ...
« Prev « First page 2403 / 2677 Last » Next »